Patents Examined by Baotran N. To
-
Patent number: 11349671Abstract: Techniques are disclosed relating to authenticating communications. A computer system may generate a master private key usable to derive user-specific private keys for a plurality of users hosted by a particular application. The computer system may generate master public configuration information usable to derive user-specific public keys for the plurality of users. The computer system may send that configuration information to a directory service accessible to applications that communicate with the particular application. The computer system may receive, from the particular application, a request for a user-specific private key for one of the plurality of users. The request may include an identifier of the user. The computer system may perform a key derivation function to generate a particular user-specific private key based on the master private key and the identifier of the user. The computer system may send the particular user-specific private key to the particular application.Type: GrantFiled: January 24, 2019Date of Patent: May 31, 2022Assignee: salesforce.com, inc.Inventor: Koson Thambundit
-
Patent number: 11343270Abstract: Systems, apparatuses, methods, and computer program products are disclosed for post-quantum cryptography (PQC). An example method includes receiving data. The example method further includes retrieving policy information associated with the data. The example method further includes generating a set of policy attributes about the data based on the data and the policy information. Subsequently, the example method includes generating a risk profile data structure based on the set of policy attributes. The risk profile data structure may be indicative of a vulnerability of the data in a PQC data environment.Type: GrantFiled: September 10, 2019Date of Patent: May 24, 2022Assignee: Wells Fargo Bank, N.A.Inventors: Robert L. Carter, Jr., Ravi K. Maganti, Bradford A. Shea, M. Erik Meinholz, Jeff J. Stapleton, Peter Bordow, Pierre Arbajian, Abhijit Rao
-
Patent number: 11343086Abstract: A transmitter provides an optical signal for transmitting a quantum key over a network. The transmitter comprises a first generator configured to generate a quantum signal, the quantum signal comprising a sequence of frames. The transmitter comprises a second generator configured to generate a pilot signal. The pilot signal comprises a sequence of signatures that is in synchrony with the sequence of frames. The transmitter comprises an optical modulator configured to generate the optical signal by modulating an optical carrier based on the quantum signal and the pilot signal. A corresponding receiver is proposed for receiving the optical signal and for extracting the quantum key.Type: GrantFiled: July 31, 2020Date of Patent: May 24, 2022Assignee: Huawei Technologies Duesseldorf GmbHInventors: Dawei Wang, David Hillerkuss, Gerhard Humer
-
Patent number: 11341484Abstract: The invention presents a solution in which blockchain Transactions are created to implement the functionality of a logic gate. The invention may be implemented on the Bitcoin platform or an alternative blockchain platform. The transaction includes a locking script which comprises instructions selected so as to implement the functionality of a logic gate such as OR, AND, XOR, NOT and so on. In some examples, the instructions may be provided in a hashed form. When the script is executed (because a second transaction is attempting to spend the output associated with the locking script) the inputs will be processed by the conditional instructions to provide an output of TRUE or FALSE. The second transaction is transmitted to the blockchain network for validation and, if determined to be valid, it will be written to the blockchain. Validation of the second transaction can be interpreted as a TRUE output. Thus, the locking script of the first transaction provides the functionality of the desired logic gate.Type: GrantFiled: April 28, 2017Date of Patent: May 24, 2022Assignee: nChain Holdings Ltd.Inventors: Craig Steven Wright, Stephane Savanah
-
Patent number: 11343284Abstract: In various embodiments, a data map generation system is configured to receive a request to generate a privacy-related data map for particular computer code, and, at least partially in response to the request, determine a location of the particular computer code, automatically obtain the particular computer code based on the determined location, and analyze the particular computer code to determine privacy-related attributes of the particular computer code, where the privacy-related attributes indicate types of personal information that the particular computer code collects or accesses. The system may be further configured to generate and display a data map of the privacy-related attributes to a user.Type: GrantFiled: May 31, 2021Date of Patent: May 24, 2022Assignee: OneTrust, LLCInventors: Kabir A. Barday, Mihir S. Karanjkar, Steven W. Finch, Ken A. Browne, Nathan W. Heard, Aakash H. Patel, Jason L. Sabourin, Richard L. Daniel, Dylan D. Patton-Kuhl, Jonathan Blake Brannon
-
Patent number: 11337076Abstract: A security platform of a data network is provided that includes security services for computing devices in communication with the data network. The security platform may apply a security policy to the computing devices when accessing the Internet via a home network (or other customer network) and when accessing the Internet via a public or third party network. To provide security services to computing devices via the home network, the security platform may communicate with a security agent application executed on the router (or other gateway device) of the home network. In addition, each of the devices identified by the security profile for the home network may be instructed or otherwise be provided a security agent application for execution on the computing devices. The security agent application may communicate with the security platform when the computing device connects to the Internet over a third party or public access point.Type: GrantFiled: September 18, 2020Date of Patent: May 17, 2022Assignee: Level 3 Communications, LLCInventors: Mayur Kudtarkar, Kirsten Coppo
-
Patent number: 11336632Abstract: The present disclosure relates to generating composite user identities in a distributed computing system. According to one embodiment, an example method generally includes transmitting, to a plurality of identity providers, a request for user identity information. A service provider receives, from a subset of the plurality of identity providers, the user identity information and selects a subset of the received user identity information to be used in verifying an identity of a user based, at least in part, on a reputation score associated with each identity provider in the subset of identity providers. The service provider generates a composite user identity based on the selected subset of the received user identity information. The service provider takes one or more actions to enable use of a service based on the generated composite user identity.Type: GrantFiled: April 20, 2020Date of Patent: May 17, 2022Assignee: INTUIT INC.Inventors: Parikshit Lingampally, Glenn C. Scott, Michael R. Gabriel
-
Patent number: 11328042Abstract: A security platform architecture is described herein. The security platform architecture includes multiple layers and utilizes a combination of encryption and other security features to generate a secure environment.Type: GrantFiled: May 6, 2020Date of Patent: May 10, 2022Assignee: Winkk, Inc.Inventor: Robert O. Keith, Jr.
-
Patent number: 11329833Abstract: The present disclosure provides systems and methods for improving provision of secret data on programmable devices. An appliance receives physical unclonable function (PUF) data pertaining to an integrated circuit. Secret data is provided to the appliance from a secret vault. Public and private PUF keys are derived based upon the PUF data. Further, ephemeral public and private keys are derived by the appliance. The public and private PUF keys, along with the ephemeral public and private keys are used to establish a secure channel for programming the secret data on the programmable device.Type: GrantFiled: September 28, 2017Date of Patent: May 10, 2022Assignee: Intel CorporationInventors: Ting Lu, Robert Landon Pelt, James Ryan Kenny
-
Patent number: 11330434Abstract: A method of security detection for a physical layer authentication system takes into account the signal-discriminating ability of an active adversary. The distance to the active adversary is estimated by an authorized transmitter based on its broadcast signal and, based on the distance estimate, the signal-to-noise ratio (SNR) of the adversary is also estimated.Type: GrantFiled: November 1, 2019Date of Patent: May 10, 2022Assignee: Shenzhen UniversityInventors: Ning Xie, Zhuoyuan Li
-
Patent number: 11323468Abstract: Mechanisms for detecting fraudulent activity based on hardware events are provided. In accordance with some embodiments of the disclosed subject matter, the method comprises: receiving a request for advertising content to be placed on a website; receiving data describing physical activity at one or more user input hardware devices; receiving data describing interactions with the website; correlating the data describing interactions with the website with the data describing physical activity at one or more user input hardware devices; determining whether at least a portion of the interactions with the website are indicative of fraudulent behavior based on the correlation; and responding to the request for advertising content on the website by inhibiting the advertising content to be transmitted to the website in response to the determination that at least a portion of the interactions with the website indicates fraudulent behavior.Type: GrantFiled: April 17, 2020Date of Patent: May 3, 2022Assignee: Integral Ad Science, Inc.Inventor: Yossef Oren
-
Patent number: 11314861Abstract: The present disclosure is directed to systems and methods of selectively implementing SCA mitigation elements on a per-thread basis to mitigate the effects of side channel attacks. Processor core circuits initiate a plurality of processor threads. Each of a plurality of SCA mitigation features include one or more SCA mitigation elements. SCA mitigation control circuitry associates a register circuit with each respective one of the plurality of processor threads initiated by the processor core circuits. The SCA mitigation control circuitry selectively ENABLES/DISABLES one or more SCA mitigation elements for each of the plurality of processor threads. The ENABLEMENT/DISABLEMENT of each of the SCA mitigation elements may be autonomously adjusted by the SCA mitigation control circuitry and/or manually adjusted via one or more user inputs provided to the SCA mitigation control circuitry.Type: GrantFiled: September 26, 2019Date of Patent: April 26, 2022Assignee: Intel CorporationInventors: Ke Sun, Kekai Hu, Henrique de Medeiros Kawakami, Rodrigo Branco
-
Patent number: 11315180Abstract: A user interface is provided for receiving instructions from a user to perform a computer related task (i.e., primary task). A module can run a primary process in the background on a first server to complete the task. Once the task is completed, the module can transmit the results to the user interface to display an output to the user. The user interface includes a button to enable the user to request information relating to a secondary process or task impacted by the primary task. By pressing the button, the user interface can submit a request to the first server or a second server to obtain information relating to the secondary process or task. In response, the user interface can receive a communication from the first or second server and display the information included in the communication to the user.Type: GrantFiled: February 7, 2020Date of Patent: April 26, 2022Assignee: CAPITAL ONE SERVICES, LLCInventors: Mark Yamashita, Sundeep Banait
-
Patent number: 11316691Abstract: Embodiments of the instant disclosure include methods and systems directed at providing enhanced security and privacy to multiple party communications that occur on zero knowledge proof (ZKP)-enabled distributed ledger-based networks (DLNs). In particular, the methods and systems include subject matter related to the deployment, and approval, of a multi-party document or instrument for consideration and approval by multiple participants of the DLN.Type: GrantFiled: April 14, 2020Date of Patent: April 26, 2022Inventor: Duncan James Westland
-
Patent number: 11316872Abstract: Methods, apparatus and computer software products implement embodiments of the present invention that include defining, for a given software category, respective, disjoint sets of communication ports that are used by each of a plurality of software systems in the given software category, including at least first and second disjoint sets. A set of port scans are identified in data traffic transmitted between multiple nodes that communicate over a network, each of the port scans including an access, in the data traffic, of a plurality of the communication ports on a given destination node by a given source node during a predefined time period. Upon detecting a port scan by one of the nodes including accesses of at least one of the communication ports in the first set and at least one of the communication ports in the second set, a preventive action is initiated.Type: GrantFiled: January 30, 2019Date of Patent: April 26, 2022Assignee: PALO ALTO NETWORKS (ISRAEL ANALYTICS) LTD.Inventors: Yinnon Meshi, Idan Amit, Jonathan Allon, Aviad Meyer
-
Patent number: 11288903Abstract: A vehicle processing device authenticates that an authorized user has requested an action by the vehicle and generates an authentication acknowledgement message. At least two security devices being present within the cabin of, or close to, the vehicle during a predetermined period following an authentication trigger event that occurs while the user performs a predetermined sequence of authentication activities (i.e., button presses, operating the vehicle or a part of it, etc.) provides a basis for the authentication acknowledgement message. Typically, information unique to each security device has been associated with the vehicle at a service provider's server. The authentication acknowledgement may include an activation code that results from processing the information, unique to each security device, received from the security devices and other random information, such as date.Type: GrantFiled: February 24, 2020Date of Patent: March 29, 2022Assignee: M2MD TECHNOLOGIES, INC.Inventor: Charles M. Link, II
-
Patent number: 11288364Abstract: Data protection based on cybersecurity feeds is described. A system receives cybersecurity feed content from a cybersecurity feed. If the cybersecurity feed content is relevant to data associated with an organization, the system evaluates a cybersecurity threat based on the cybersecurity feed content. The system selects at least one data protection policy, from multiple data protection policies, which corresponds to the evaluated cybersecurity threat. The system implements the selected at least one data protection policy.Type: GrantFiled: April 25, 2019Date of Patent: March 29, 2022Assignee: EMC IP Holding Company LLCInventors: Amihai Savir, Assaf Natanzon, Avitan Gefen
-
Patent number: 11288382Abstract: Non-informational data D is generated as an output using a non-informational data E and informational data as inputs to a function on a computing device in an information-restricted domain. The function may be an XOR and the non-informational data E may be a pseudorandom string of the same length as the informational data. The non-informational data D is moved to an unrestricted domain where it may be managed normally. When the informational data is needed it can be re-generated using the non-informational data D and non-informational data E as inputs to an inverse function (XOR is its own inverse). The non-informational data E may be generated from a smaller random seed.Type: GrantFiled: February 4, 2020Date of Patent: March 29, 2022Assignee: TFOR LLCInventor: David von Vistauxx
-
Patent number: 11288359Abstract: Apparatuses, systems, methods, and computer program products are disclosed for automatic account protection. A method includes detecting a trigger indicating one or more of a potential and an actual security breach at one or more websites where a user has an account that is accessible using electronic credentials. A method includes logging into the one or more websites for the user using the electronic credentials. A method includes performing one or more actions at the one or more websites associated with the electronic credentials to protect the user's account.Type: GrantFiled: June 3, 2019Date of Patent: March 29, 2022Assignee: MX TECHNOLOGIES, INC.Inventor: John Ryan Caldwell
-
Patent number: 11281798Abstract: A system may include an interface configured to couple to a network, and includes a processor and a memory accessible to the processor. The memory may be configured to store instructions that, when executed, cause the processor to process search results corresponding to multiple data owners to selectively filter personally identifiable information (PII) associated with one or more consumers from the set of search results according to data sharing permissions for each of the data owners to produce filtered results. The instructions may further cause the processor to provide the filtered results to a user device through the network.Type: GrantFiled: December 23, 2019Date of Patent: March 22, 2022Assignee: Early Warning Services, LLCInventor: Michael Cook